-
-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Feldsam/show ban info page #5796
base: staging
Are you sure you want to change the base?
Conversation
a47999d
to
91079b2
Compare
Signed-off-by: Kristian Feldsam <[email protected]>
91079b2
to
873863f
Compare
Just with behavioural check. Signed-off-by: Kristian Feldsam <[email protected]>
I've added a simple self-unban page that features a behavioral check to enhance user autonomy and maintain security. This update allows users to address accidental bans efficiently while ensuring the process isn't exploited by automated systems. Looking forward to your feedback! |
This pull request has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. |
@DerLinkman @FreddleSpl0it hello, would somebody review this? Thanks! |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Still need the addition of the NFTables Stuff, but currently no time for that...
Maybe @tomudding or @amorfo77 can help here. Otherwise it is still on hold i'm afraid... |
This pull request has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. |
Reopen please |
aaee040
to
4d688c5
Compare
This pull request introduces a significant enhancement to our netfilter functionality, addressing the problem of incorrectly configured devices which could lock out entire company branches. To mitigate this issue and enhance our network security posture, the following changes have been implemented:
Netfilter Modifications: The netfilter image has been updated to always allow TCP traffic on ports 80 and 443. This adjustment ensures that, despite any broad blocking rules, essential web traffic remains uninterrupted. Please note that this change is currently applied only to the IPTables module; integration with NFTables is pending and will require further contributions.
OpenResty Integration: By leveraging the OpenResty nginx image, which includes integrated support for Lua and Redis, I've established a robust mechanism for dynamic response based on IP reputation. Specifically, the nginx
location / {}
directive now includes a Lua script to check against theF2B_ACTIVE_BANS
andF2B_PERM_BANS
in Redis. If an IP is found to be blacklisted, the user is redirected to a custom 403 page explaining the block.Future Enhancements: While the current implementation focuses on notifying users of a block, plans for future updates include the introduction of a self-service unban feature. This capability would allow users to resolve accidental bans autonomously, reducing administrative overhead and improving user experience.
Your feedback and contributions, especially regarding the integration with NFTables and the development of the self-service unban feature, are highly welcomed and appreciated.